Feeds

Assange not running in new Australian election

Senatorial escape route scuttled by eligibility requirements

Intelligent flash storage arrays

Julian Assange will not, as previously indicated, run for Australia Senate again.

The part-time Ecuadorian ran as a candidate for The Wikileaks Party at Australia's general election last year, hoping to win a Senate seat in the State of Victoria. Doing so probably would not have allowed him safe passage from Ecuador’s London embassy, but might have given him some new legal arguments to pursue.

A second candidacy was raised as a possibility after the Senate election was botched in the State of Western Australia. Last November, the Wikileaks Party announced it would once again seek to install Assange as its main candidate for any re-run election.

Subsequent decisions mean that election has been ordered for April 5th, when Western Australia will return to the polls to elect six Senators.

But Assange is not on the ballot paper because, says Wikileaks Party's campaign manager Gerry Georgatos, Australia's Electoral Commission deemed he is ineligible to run.

Australian citizens are eligible to run as candidate if they are over 18 years of age and are “either enrolled or eligible to be enrolled on the Commonwealth electoral roll.” Would-be candidates must also satisfy the provisions of Section 44 of Australia's Constitution , that rules out criminals, bankrupts, those accused of treason, foreign citizens and those who work for or profit from Commonwealth enterprises.

Tempting as it is to imagine Assange has become an Ecuadorian citizen or been charged with treason, a stuff-up looks the likely reason for the the leaker-in-chief's failure to appear on the ballot paper.

"He may not have enrolled in Western Australia on time," Georgatos told The Reg. Once Assange's candidature was untenable, WikiLeaks party's 2600-strong membership elected two new candidates: TV producer Tibor Meszaros and journalist Lucy Nicol.

Georgatos but is not optimistic about their prospects, fearing the taint of what he said were incorrect reports of the party's intention to direct preferences to right-wing parties at Australia's September 2013 election. ®

Internet Security Threat Report 2014

More from The Register

next story
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.